Unit EQ: How can you protect your safety while on the Internet.
LEQ: Today? What have you learned about internet safety?
What sort of things do not belong in a screen name or password?
What sort of things does a cyber predator do to trick people.
What kinds of information might someone give away when chatting online?
What are the impacts of Cyber Bullying
What are some examples of appropriate uses of internet messaging technologies?
Activating Strategies: Show cartoon from this page. Discuss Unit Essential Question and Lesson Essential Questions:
Results must be emailed to the teacher's gaggle account.
Summarizing Strategies:
Email your Toondobook to the teacher when it is done. Select publish, select view, click email link second up from bottom on right.
Day 8-10 Cyber Safety
Culminating Activity
What sort of things do not belong in a screen name or password?
What sort of things does a cyber predator do to trick people.
What kinds of information might someone give away when chatting online?
What are the impacts of Cyber Bullying
What are some examples of appropriate uses of internet messaging technologies?
Assignment:
Develop a Public Service Announcement on Internet Safety or Cyberbullying using:
Email your Toondobook to the teacher when it is done. Select publish, select view, click email link second up from bottom on right.